SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Online Privacy  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet privacy From Wikipedia ' Internet privacy  consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. Experts in the field of Internet privacy have a consensus that Internet privacy does not really exist.   Privacy advocates believe that it should exist.
What Privacy? Privacy is a value which may only be appreciated once it is lost. Take for example your financial information, your medical records, or your buying patterns. How will  they  use that information? That is privacy.  "It's not about the man who wants to watch pornography in complete anonymity over the Internet. It's about the woman who's afraid to use the Internet to organize her community against a proposed toxic dump -- afraid because the dump's investors are sure to dig through her past if she becomes too much of a nuisance,"  Simson Garfinkel, Database Nation
It seems that there are two general reasons why privacy is important.  The first is that privacy helps individuals maintain their autonomy and individuality. People define themselves by controlling/revealing  information about themselves without the need for people to answer for the choices they make about what information is shared and what is held close.  A second reason that privacy is important is because of its functional benefits. The privacy of people's identities: for someone speaking freely at a political rally and not having to answer to political opponents or someone visiting a bar and not having to deal with unwanted suitors. Anonymity lends to privacy for safety and peace of mind.  It is our right to divulge information, to who we want. Privacy deals with how people who have this information on us will use it.
Where are the boundries? Anonymity can be socially useful in encouraging honesty, risk-taking, experimentation and creativity.  Confidentiality improves communication flows and is vital to trust in professional (doctors, lawyers, psychologists) and corporate settings.  Why would we give up protecting and demanding our privacy?  For convenience and savings? Better services?
Online vs Offline Apparently in Britain they have face-recognition systems to scan pedestrians in search of wanted criminals. There is nothing you can do to stop this. No law will prevent it.  Do you feel safer for it? Claims are “yes”. Do you feel unsafe without it? Banning the cameras will only drive this technology underground and then we have even less of an idea of what is really happening.
Online Supposedly computer users long ago gave up the notion of having any privacy in email.  Anything entered onto a computer is more or less considered fair  game, especially to your employer .  We assume that police with a warrant can access any kind of computer logs and your ISP may care to keep.
Technology  Makes it possible to gather personal information about each of us in a way that was never possible before.  Given rise to unprecedented innovation. Web 2.0 - As the online experience becomes more interactive, we share more information.  But in addition to worries about corporate spying, we should also take a close look at what governments can now access and use.
How safe are we? Echelon – Nobody knows! Phorm – public missunderstanding of privacy?  Spyware – the owner of the information has the right to do whatever with it? A Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking. Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif. Anonymous proxy - why would you want to use it if not for dubious reasons - it is not as secure as you think!
Google and Privacy From their privacy policy: “ We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search. Google also uses cookies in its advertising services to help advertisers and publishers serve and manage ads across the web. We may set a cookie in your browser when you visit a website and view or click on an ad supported by Google’s advertising services.” “ Google reads you (G)mail!” Dig by Microsoft at their rival.
Google desktop “ At first I didn't care if Google Desktop was on computers--regardless whether I wanted to use it or not. After I read about version 3, I have been recommending its removal from computers.” Search across computers feature (off by default) Once it indexes your computer, it copies your files; such as word documents, spreadsheets, PDFs, text files, and others; to Google's servers for up to 30 days. Please take a second and let that sink in... It copies your files to their servers! Those files could be anything from a shopping list, to your taxes, to your credit card information, to what ever you have stored on your computer.
Action Groups – the good guys? The Future of Privacy Forum  www.deepblueinteractive.com/blog/the- future-of-privacy - forum .html  Speculation about The Future of Privacy Forum among other companies include that it is a business group attempting to block new government intervention in the advertising business (think Google & Yahoo’s ad fate),  still others see it as a slice of a growing attempt to prevent  Google from gaining any further influence than it already has.  Microsoft in particular has been lobbying in Washington about privacy, a topic it views as Google’s jugular.
Thought for the day Survey the surveillance “ A weak government is not a guarantee of freedom. It is a guarantee of chaos that will be followed by tyranny. What we need is a strong  government that is totally subject to scrutiny so that every mistake that they make will be pounced upon.”  David Brin - Author of "The Transparent Society“ The cameras are getting smaller, the databases are getting more pervasive; the technologies for spying are getting more profound.  These things are coming, whether we embrace them or not. If we drive them underground, we'll have no say in how they're used.

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (8)

Who Wants To Be Millionaire Digiacomo David
Who Wants To Be Millionaire Digiacomo DavidWho Wants To Be Millionaire Digiacomo David
Who Wants To Be Millionaire Digiacomo David
 
Ubuntu manual
Ubuntu manualUbuntu manual
Ubuntu manual
 
Guia de Ubuntu Server en Inglés
Guia de Ubuntu Server en Inglés Guia de Ubuntu Server en Inglés
Guia de Ubuntu Server en Inglés
 
Workstation Sales
Workstation SalesWorkstation Sales
Workstation Sales
 
Crisis Response and Risk Mitigation
Crisis Response and Risk MitigationCrisis Response and Risk Mitigation
Crisis Response and Risk Mitigation
 
Cognition Lesson Plan
Cognition Lesson PlanCognition Lesson Plan
Cognition Lesson Plan
 
Soilmechanics2
Soilmechanics2Soilmechanics2
Soilmechanics2
 
Soilmechanics1
Soilmechanics1Soilmechanics1
Soilmechanics1
 

Kürzlich hochgeladen

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Kürzlich hochgeladen (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

MediaVision Presentation Online Privacy 06 02 2009

  • 1.
  • 2. Internet privacy From Wikipedia ' Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. Experts in the field of Internet privacy have a consensus that Internet privacy does not really exist. Privacy advocates believe that it should exist.
  • 3. What Privacy? Privacy is a value which may only be appreciated once it is lost. Take for example your financial information, your medical records, or your buying patterns. How will they use that information? That is privacy. "It's not about the man who wants to watch pornography in complete anonymity over the Internet. It's about the woman who's afraid to use the Internet to organize her community against a proposed toxic dump -- afraid because the dump's investors are sure to dig through her past if she becomes too much of a nuisance," Simson Garfinkel, Database Nation
  • 4. It seems that there are two general reasons why privacy is important. The first is that privacy helps individuals maintain their autonomy and individuality. People define themselves by controlling/revealing information about themselves without the need for people to answer for the choices they make about what information is shared and what is held close. A second reason that privacy is important is because of its functional benefits. The privacy of people's identities: for someone speaking freely at a political rally and not having to answer to political opponents or someone visiting a bar and not having to deal with unwanted suitors. Anonymity lends to privacy for safety and peace of mind. It is our right to divulge information, to who we want. Privacy deals with how people who have this information on us will use it.
  • 5. Where are the boundries? Anonymity can be socially useful in encouraging honesty, risk-taking, experimentation and creativity. Confidentiality improves communication flows and is vital to trust in professional (doctors, lawyers, psychologists) and corporate settings. Why would we give up protecting and demanding our privacy? For convenience and savings? Better services?
  • 6. Online vs Offline Apparently in Britain they have face-recognition systems to scan pedestrians in search of wanted criminals. There is nothing you can do to stop this. No law will prevent it. Do you feel safer for it? Claims are “yes”. Do you feel unsafe without it? Banning the cameras will only drive this technology underground and then we have even less of an idea of what is really happening.
  • 7. Online Supposedly computer users long ago gave up the notion of having any privacy in email. Anything entered onto a computer is more or less considered fair game, especially to your employer . We assume that police with a warrant can access any kind of computer logs and your ISP may care to keep.
  • 8. Technology Makes it possible to gather personal information about each of us in a way that was never possible before. Given rise to unprecedented innovation. Web 2.0 - As the online experience becomes more interactive, we share more information. But in addition to worries about corporate spying, we should also take a close look at what governments can now access and use.
  • 9. How safe are we? Echelon – Nobody knows! Phorm – public missunderstanding of privacy? Spyware – the owner of the information has the right to do whatever with it? A Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking. Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif. Anonymous proxy - why would you want to use it if not for dubious reasons - it is not as secure as you think!
  • 10. Google and Privacy From their privacy policy: “ We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search. Google also uses cookies in its advertising services to help advertisers and publishers serve and manage ads across the web. We may set a cookie in your browser when you visit a website and view or click on an ad supported by Google’s advertising services.” “ Google reads you (G)mail!” Dig by Microsoft at their rival.
  • 11. Google desktop “ At first I didn't care if Google Desktop was on computers--regardless whether I wanted to use it or not. After I read about version 3, I have been recommending its removal from computers.” Search across computers feature (off by default) Once it indexes your computer, it copies your files; such as word documents, spreadsheets, PDFs, text files, and others; to Google's servers for up to 30 days. Please take a second and let that sink in... It copies your files to their servers! Those files could be anything from a shopping list, to your taxes, to your credit card information, to what ever you have stored on your computer.
  • 12. Action Groups – the good guys? The Future of Privacy Forum www.deepblueinteractive.com/blog/the- future-of-privacy - forum .html Speculation about The Future of Privacy Forum among other companies include that it is a business group attempting to block new government intervention in the advertising business (think Google & Yahoo’s ad fate), still others see it as a slice of a growing attempt to prevent Google from gaining any further influence than it already has. Microsoft in particular has been lobbying in Washington about privacy, a topic it views as Google’s jugular.
  • 13. Thought for the day Survey the surveillance “ A weak government is not a guarantee of freedom. It is a guarantee of chaos that will be followed by tyranny. What we need is a strong government that is totally subject to scrutiny so that every mistake that they make will be pounced upon.” David Brin - Author of "The Transparent Society“ The cameras are getting smaller, the databases are getting more pervasive; the technologies for spying are getting more profound. These things are coming, whether we embrace them or not. If we drive them underground, we'll have no say in how they're used.

Hinweis der Redaktion

  1. Particularly broad!